Search for "24" returned 4349 results
43 min
Hirne Hacken
Menschliche Faktoren der IT-Sicherheit
60 min
Concepts for global TSCM
getting out of surveillance state mode
58 min
Virtual Machine Introspection
From the Outside Looking In
41 min
A WebPage in Three Acts
live coding performance
54 min
How hackers grind an MMORPG: by taking it apart!
An introduction to reverse engineering network protocols
26 min
Opening Event
35C3: Refreshing Memories
39 min
ID Cards in China: Your Worst Nightmare
In China Your ID Card Knows Everything
49 min
Toward a Cognitive "Quantified Self"
Activity Recognition for the Mind
51 min
Uncovering vulnerabilities in Hoermann BiSecur
An AES encrypted radio system
51 min
Ecuador: how an authoritarian government is fooling the entire world
Guess what? The Government of Rafael Correa actually is…
32 min
library operating systems
reject the default reality^W abstractions and substitute…
57 min
Hello World!
How to make art after Snowden?
58 min
Decoding Contactless (Card) Payments
An Exploration of NFC Transactions and Explanation How…
58 min